>>> On 25.03.16 at 19:01, wrote:
>> @@ -174,10 +174,61 @@ compat_bad_hypercall:
>> /* %rbx: struct vcpu, interrupts disabled */
>> ENTRY(compat_restore_all_guest)
>> ASSERT_INTERRUPTS_DISABLED
>> +.Lcr4_orig:
>> +ASM_NOP8 /* testb $3,UREGS_cs(%rsp) */
>> +ASM_NOP2 /* jp
Add a new pvusb backend type "qusb" which is provided by qemu. It can
be selected either by specifying the type directly in the configuration
or it is selected automatically by libxl in case there is no "usbback"
driver loaded.
Signed-off-by: Juergen Gross
---
V4: bail out in case of usbback_is_l
libxl__need_xenpv_qemu() is called with configuration data for console,
vfbs, disks and channels today in order to evaluate the need for
starting a device model for a pv domain.
The console data is local to the caller and setup in a way to never
require a device model. All other data is taken from
This patch series is meant to be applied on top of Chunyan's series
to support pvusb in libxl.
It is adding support for an alternative pvusb backend "qusb" via qemu.
Changes in V4:
- dropped patch 5
- patch 1: Return (negative) error value in case of failure, 0 or 1 else
- patch 2: Bail out in ca
Add a service routine checking whether a device model must be started
after adding a device to a domain.
Signed-off-by: Juergen Gross
---
tools/libxl/libxl.c | 12
tools/libxl/libxl_dm.c | 22 ++
tools/libxl/libxl_internal.h | 4
tools/libxl/
Add an internal service function to check for a running device model.
This can be used later when adding devices to a domain requiring a
device model for either printing an error message or starting the
device model in case it is not already running.
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
>>> On 25.03.16 at 09:54, wrote:
> Another sum up:
>
> - common sense seems to be the current way xen-detect is trying to
> guess the guest type is unreliable and should be dropped (Jan
> would like to keep it, but I guess he just wants the information
> to be available - is this correct, J
flight 87789 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/87789/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 65543
test-amd64-amd64-xl-qemuu-ov
On 18/03/16 15:47, Juergen Gross wrote:
> On 18/03/16 13:52, Gerd Hoffmann wrote:
>> On Do, 2016-03-10 at 16:19 +0100, Juergen Gross wrote:
>>> This series adds a Xen pvUSB backend driver to qemu. USB devices
>>> connected to the host can be passed through to a Xen guest. The
>>> devices are specif
On 28/03/16 16:55, Konrad Rzeszutek Wilk wrote:
> On Tue, Mar 22, 2016 at 08:29:22AM +0100, Juergen Gross wrote:
>> Add a new pvusb backend type "qusb" which is provided by qemu. It can
>> be selected either by specifying the type directly in the configuration
>> or it is selected automatically by
From: Vikram Sethi
ARMv8 architecture allows performing prefetch data/instructions
from memory locations marked as normal memory. Prefetch does not
mean that the data/instruction has to be used/executed in code
flow. All PTEs that appear to be valid to MMU must contain valid
physical address with
On 28/03/16 16:50, Konrad Rzeszutek Wilk wrote:
> On Tue, Mar 22, 2016 at 08:29:23AM +0100, Juergen Gross wrote:
>> Today the device model (qemu) is started for a pv domain only in case
>> a device requiring qemu is specified in the domain configuration
>> (qdisk, vfb, channel). If there is no such
Hi Daniel,
On 29 March 2016 at 06:08, Daniel De Graaf wrote:
> On 03/28/2016 04:54 PM, Konrad Rzeszutek Wilk wrote:
>>
>> On Tue, Mar 29, 2016 at 01:55:07AM +0800, fu@linaro.org wrote:
>>>
>>> From: Fu Wei
>>>
>>> This patch add a check_xsm_signature static function for detecting XSM
>>> fro
Hi Konrad,
On 29 March 2016 at 04:54, Konrad Rzeszutek Wilk wrote:
> On Tue, Mar 29, 2016 at 01:55:07AM +0800, fu@linaro.org wrote:
>> From: Fu Wei
>>
>> This patch add a check_xsm_signature static function for detecting XSM
>> from the second unknown module.
>>
>> If xen can't get the kind
From: Fu Wei
This patch add a check_xsm_signature static function for detecting XSM
from the second unknown module.
If Xen can't get the kind of module from compatible, we guess the kind of
these first two unknown respectively:
(1) The first unknown must be kernel;
(2) The second unknown
flight 87739 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/87739/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-libvirt-pair 21 guest-migrate/src_host/dst_host fail REGR. vs.
86491
test-amd64-i3
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Konrad
> Rzeszutek Wilk
> Sent: Monday, March 28, 2016 9:21 PM
> To: Hao, Xudong ; wei.l...@citrix.com;
> samuel.thiba...@ens-lyon.org
> Cc: xen-devel@lists.xen.org; stefano.stabell...@eu.citrix.com
On March 28, 2016 10:11pm, Konrad Rzeszutek Wilk wrote:
> >
> > > > +list_del(&pdev->domain_list);
> > > > +pdev->domain = NULL;
> > > > +pci_hide_existing_device(pdev);
> > > > +break;
> > > > +}
> > > > +}
> > > > +
> > > > +pcidevs
flight 87710 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/87710/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-i386 10 guest-start fail REGR. vs. 86454
test-amd64-i386-qem
On 03/28/2016 04:54 PM, Konrad Rzeszutek Wilk wrote:
On Tue, Mar 29, 2016 at 01:55:07AM +0800, fu@linaro.org wrote:
From: Fu Wei
This patch add a check_xsm_signature static function for detecting XSM
from the second unknown module.
If xen can't get the kind of module from compatible, we g
On Tue, Mar 29, 2016 at 01:55:07AM +0800, fu@linaro.org wrote:
> From: Fu Wei
>
> This patch add a check_xsm_signature static function for detecting XSM
> from the second unknown module.
>
> If xen can't get the kind of module from compatible, we guess the kind of
> these first two unknown r
On Wed, Mar 23, 2016 at 04:36:27PM +, Andrew Cooper wrote:
> Later changes will cause the cpuid generation logic to seed their information
s/Later changes/Patch titled tools/libxc: Use featuresets rather than guesswork
> from a featureset. This patch adds the infrastructure to specify a
> fe
On Wed, Mar 23, 2016 at 04:36:26PM +, Andrew Cooper wrote:
> It is able to reports the current featuresets; both the static masks and
> dynamic featuresets from Xen, or to decode an arbitrary featureset into
> `/proc/cpuinfo` style strings.
>
> Signed-off-by: Andrew Cooper
> Acked-by: Wei Liu
flight 87701 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/87701/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-rumpuserxen6 xen-build fail REGR. vs. 59254
test-amd64-amd64-xl
flight 87722 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/87722/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 65543
test-amd64-amd64-xl-qemuu-ov
On Wed, Mar 23, 2016 at 04:36:25PM +, Andrew Cooper wrote:
> Signed-off-by: Andrew Cooper
> Acked-by: Wei Liu
Reviewed-by: Konrad Rzeszutek Wilk
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Wed, Mar 23, 2016 at 04:36:24PM +, Andrew Cooper wrote:
> Rather than having a different local copy of some of the feature
> definitions.
>
> Modify the xc_cpuid_x86.c cpumask helpers to appropriate truncate the
s/appropiate/appropiately/ ?
> new values.
>
> As some of the feature have b
On Wed, Mar 23, 2016 at 04:36:23PM +, Andrew Cooper wrote:
> The type of the pointer to a bitmap is not interesting; it does not affect the
> representation of the block of bits being pointed to.
>
> Make the libxc functions consistent with those in Xen, so they can work just
> as well with 'u
On Wed, Mar 23, 2016 at 04:36:22PM +, Andrew Cooper wrote:
> And provide stubs for toolstack use.
>
> Signed-off-by: Andrew Cooper
> Acked-by: Wei Liu
> Acked-by: David Scott
> Acked-by: Jan Beulich
> ---
> CC: Tim Deegan
You should also CC Daniel De Graaf..
>
> v2:
> * Rebased to use
On Wed, Mar 23, 2016 at 04:36:21PM +, Andrew Cooper wrote:
> This allows PV domains with different featuresets to observe different values
> from a native cpuid instruction, on supporting hardware.
>
> It is important to leak the host view of HTT and CMP_LEGACY through to guests,
> even though
On Wed, Mar 23, 2016 at 04:36:20PM +, Andrew Cooper wrote:
> And use them in preference to cpumask_defaults on context switch. HVM domains
Extra space before HVM
> must not be masked (to avoid interfering with cpuid calls within the guest),
> so always lazily context switch to the host defaul
On Wed, Mar 23, 2016 at 04:36:19PM +, Andrew Cooper wrote:
> A single ctxt_switch_levelling() function pointer is provided
> (defaulting to an empty nop), which is overridden in the appropriate
> $VENDOR_init_levelling().
>
> set_cpuid_faulting() is made private and included within
> intel_ctx
> + * Context switch levelling state to the next domain. A parameter of NULL is
> + * used to context switch to the default host state, and is used by the
> BSP/AP
> + * startup code.
> + */
> +static void intel_ctxt_switch_levelling(const struct domain *nextd)
> +{
> + struct cpuidmasks *the
Julien and George,
Thank you for the comments. I had one question I wanted to ask.
>A DOMID_XEN page could be read only too. For instance, the meta-data
>of the trace buffer is read-only (see t_info), we don't want a domain
>to be able to overwrite them.
>However, all the foreign page are mapped
On Wed, Mar 23, 2016 at 04:36:17PM +, Andrew Cooper wrote:
> This patch is best reviewed as its end result rather than as a diff, as it
> rewrites almost all of the setup.
>
> On the BSP, cpuid information is used to evaluate the potential available set
> of masking MSRs, and they are uncondit
From: Fu Wei
This patch add a check_xsm_signature static function for detecting XSM
from the second unknown module.
If xen can't get the kind of module from compatible, we guess the kind of
these first two unknown respectively:
(1) The first unknown must be kernel;
(2) The second unknown
On Wed, Mar 23, 2016 at 04:36:16PM +, Andrew Cooper wrote:
> A toolstack needs to know how much control Xen has over the visible cpuid
> values in PV guests. Provide an explicit mechanism to query what Xen is
> capable of.
If it is only for PV, why don't you add that subops with that name?
>
I get a crash on boot with my Fedora xen-4.6.1-3.fc24 packages. This seems
to be related to how it is compiled because the same code compiled under
Fedora 23 works. The boot logs are attached. The address mentioned in the
crash has the code
0x82d08023d3c3 :
je 0x82d08023e90a
On Wed, Mar 23, 2016 at 04:36:16PM +, Andrew Cooper wrote:
> A toolstack needs to know how much control Xen has over the visible cpuid
> values in PV guests. Provide an explicit mechanism to query what Xen is
> capable of.
>
> This interface will currently report no capabilities. This change
On Wed, Mar 23, 2016 at 04:36:15PM +, Andrew Cooper wrote:
> Before c/s 44e24f8567 "x86: don't call generic_identify() redundantly", the
> commandline-provided masks would take effect in Xen's view of the features.
s/the// ?
Or perhaps s/the/cpuid// ?
>
> As the masks got applied after the q
Konrad,
> Modified to provide support for xentrace on the ARM platform. Added
> flask credential to allow dom0 dom_xen mapping and write access for
> trace buffers.
>>
>> So .. what does that mean?
>>
>> Is that something xentrace requests? Why is this ARM specific?
>> Looking at xsm_sysctl and ho
flight 87700 linux-mingo-tip-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/87700/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 6 xen-build fail REGR. vs. 60684
test-amd64
On Wed, Mar 23, 2016 at 04:36:14PM +, Andrew Cooper wrote:
> Currently, {pv,hvm}_cpuid() has a large quantity of essentially-static logic
> for modifying the features visible to a guest. A lot of this can be subsumed
> by {pv,hvm}_featuremask, which identify the features available on this
> ha
On Wed, Mar 23, 2016 at 04:36:13PM +, Andrew Cooper wrote:
> APIC and XSAVE have dependent features, which also need disabling if Xen
> chooses to disable a feature.
>
> Use setup_clear_cpu_cap() rather than clear_bit(), as it takes care of
> dependent features as well.
>
> Signed-off-by: And
On Thu, Mar 17, 2016 at 07:56:32PM +, Andrew Cooper wrote:
> On 17/03/16 19:51, Konrad Rzeszutek Wilk wrote:
> > On Tue, Mar 15, 2016 at 03:35:07PM +, Andrew Cooper wrote:
> >> When clearing a cpu cap, clear all dependent features. This avoids having
> >> a
> >> featureset with intermedia
On 3/16/16 2:14 PM, Doug Goldstein wrote:
> On 3/8/16 10:50 AM, Wei Liu wrote:
>> On Tue, Mar 08, 2016 at 10:34:42AM -0600, Doug Goldstein wrote:
>>> On 3/8/16 9:38 AM, Wei Liu wrote:
On Mon, Mar 07, 2016 at 08:23:40PM -0600, Doug Goldstein wrote:
> The build should not use -O0 as that res
On Tue, Mar 22, 2016 at 08:29:22AM +0100, Juergen Gross wrote:
> Add a new pvusb backend type "qusb" which is provided by qemu. It can
> be selected either by specifying the type directly in the configuration
> or it is selected automatically by libxl in case there is no "usbback"
> driver loaded.
On Tue, Mar 22, 2016 at 08:29:23AM +0100, Juergen Gross wrote:
> Today the device model (qemu) is started for a pv domain only in case
> a device requiring qemu is specified in the domain configuration
> (qdisk, vfb, channel). If there is no such device the device model
> isn't started and hence it
On Tue, Mar 22, 2016 at 07:19:49AM -0600, Jan Beulich wrote:
> Other than the controllers supported so far, multiple port Pericom
> boards map all of their ports via BAR0, which requires a number of
> adjustments: Instead of tracking "max_bars" we now flag whether all
> ports use BAR0, and whether
flight 87702 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/87702/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-qcow2 11 migrate-support-checkfail never pass
test-armhf-armhf-libvirt-qcow2 13 guest-sav
flight 87692 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/87692/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 3 host-install(3) broken in 87395 REGR. vs. 66399
build-amd64-rumpuserxen
>
> > > +list_del(&pdev->domain_list);
> > > +pdev->domain = NULL;
> > > +pci_hide_existing_device(pdev);
> > > +break;
> > > +}
> > > +}
> > > +
> > > +pcidevs_unlock();
> > > +
> > > +if ( !is_hardware_domain(d) )
> > > +
On 03/28/2016 05:34 AM, Fanny Dwargee wrote:
Hi,
I'm currently using Xen v4.6.1 compiled from sources on Linux Debian
Jessie and I would like to change the CPUID hypervisor vendor string
when queried from a HVM DomU (Windows7 SP1 64 bits).
According to http://www.sandpile.org/x86/cpuid.htm#l
On Mon, Mar 28, 2016 at 06:27:21AM +, Xu, Quan wrote:
> On March 26, 2016 4:07am, Konrad Rzeszutek Wilk
> wrote:
> > On Thu, Mar 24, 2016 at 01:57:58PM +0800, Quan Xu wrote:
> >
> > Hey!
> >
> > Thanks for the patch!
> >
> > I see that you have __must_check..
> >
> > But if you check the
On Mon, Mar 28, 2016 at 02:03:35AM +, Hao, Xudong wrote:
> > -Original Message-
> > From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Konrad
> > Rzeszutek Wilk
> > Sent: Saturday, March 26, 2016 2:58 AM
> > To: Hao, Xudong
> > Cc: stefano.stabell...@eu.citrix.com; x
Hi,
I'm currently using Xen v4.6.1 compiled from sources on Linux Debian Jessie
and I would like to change the CPUID hypervisor vendor string when queried
from a HVM DomU (Windows7 SP1 64 bits).
According to http://www.sandpile.org/x86/cpuid.htm#level_4000_h this
information is queried via EA
flight 87625 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/87625/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-libvirt-pair 21 guest-migrate/src_host/dst_host fail REGR. vs.
86491
test-amd64-i3
+cc Konrad Rzeszutek Wilk , who is also reviewing this
patch.
On March 24, 2016 11:38pm, Dario Faggioli wrote:
> On Thu, 2016-03-24 at 13:57 +0800, Quan Xu wrote:
> > If Device-TLB flush timed out, we would hide the target ATS device and
> > crash the domain owning this ATS device. If impacted d
58 matches
Mail list logo